Skip to main content

Mobile Main Menu

  • Library Portal
    • About Library
    • Search the Library
    • A-Z Databases
    • Research Tools
    • Subject Guides
    • Browse Journals
    • AppsAnywhere
    • Accessibility Tools
  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library
  • English Language Hub
    • About English Language
    • Academic Writing in English
    • Self-Study Resources
  • Workshops
  • One-to-ones

Secondary navigation

  • Your Projects
  • Feedback to Win
  • iLearn
  • About Us
  • Office 365
  • Request It!
  • News Hub
Home

Main Menu

  • Library
    • About the Library
    • A-Z Databases
    • Accessibility Tools
    • AppsAnywhere
    • Browse Journals
    • eBook Spotlight Collections
    • Reading Lists
    • Research Tools
    • Search the Library
    • Subject Guides

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

    Get personalised support from a Librarian

    Book a one-to-one

  • Academic Skills
    • About Academic Skills
    • Academic Integrity
    • Academic Writing
    • Artificial Intelligence
    • Digital Capabilities
    • Dissertation Research
    • Exams and Assessments
    • STEM Skills
    • Using the Library

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one

    Get personalised support from an Academic Skills Tutor

    Book a one-to-one
  • English Language
    • About English Language
    • Academic Writing in English
    • Self-Study Resources

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one

    Get personalised support from an Academic English Lecturer

    Book a one-to-one
  • Workshops
  • One-to-Ones

Help

COM6003

Computer Systems Security

All the reading and resources from your modules, all in one place

Reading List Category
Resource Type
Lesson

Lesson 1

Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.

Lesson 2

Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Wider Reading Video

The 5 Worst Computer Viruses in History

by SciShow
Wider Reading Video

Host Based Intrusion Detection Systems | CBT…

by CBT Nuggets
Wider Reading Video

DEFCON 19: The History and the Evolution of…

by Christiaan008
Wider Reading Article

Towards a taxonomy of intrusion-detection systems

by Debar, H. et al.
Wider Reading Video

Viruses, Worms and Botnet Explained

by Ward Muylaert
Wider Reading Video

How Does Antivirus Software Work And How To Evade…

by Loi Liang Yang

Lesson 3

Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Essential Resource Video

Cryptographic Hash Functions - CompTIA Security+…

by Professor Messer
Essential Resource Video

Public Key Cryptography: RSA Encryption

by Art of the Problem
Essential Resource Video

CISSP Training - Cryptography

by IT Certification and Training
Essential Resource Website

Transposition Cipher

by DCode
Essential Resource Website

Pigpen Cipher

by DCode
Essential Resource Website

Frequency Analysis

by DCode
Essential Resource Video

Symmetric Key and Public Key Encryption

by ITFreeTraining
Essential Resource Video

Lecture 1: Introduction to Cryptography by…

by Introduction to Cryptography by Christof Paar
Essential Resource Video

What is a Digital Signature?

by e-estonia
Wider Reading Article

Symmetric and Asymmetric Encryption

by Simmons, G. J.

Lesson 4

Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Essential Resource Video

Insider Attacks in Secure Shell Environments

by SSH Communications Security
Essential Resource Website

What are the potential risks of using SSL in real…

by Milvus
Essential Resource Video

Lesson 1: Next-Generation Firewalls: Overview of…

by AlgoSec
Essential Resource Video

How SSH Works

by Karol Cholewa
Essential Resource Video

MicroNugget: How IPsec Site to Site VPN Tunnels…

by Keith Barker - The OG of IT
Essential Resource Video

IPSec Basics - 19 June 2013

by APNIC Training

Lesson 5

Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Essential Resource Video

How SSH Works

by Karol Cholewa
Essential Resource Website

Wireless security: Differences between WEP, WPA,…

by Irei, A.
Essential Resource Website

Malaysia car thieves steal finger

by Kent, J.
Essential Resource Website

Key Management Cheat Sheet

by OWASP Cheat Sheet Series
Essential Resource Video

IPSec Basics - 19 June 2013

by APNIC Training
Essential Resource Website

8 Best Practices for Encryption Key Management…

by ESJ
Essential Resource Website

5 authentication methods putting passwords to…

by TNW
Essential Resource Website

Identity and Access Management in Cloud Computing

by RocketMe Up Cybersecurity
Essential Resource Website

What is Single Sign-On (SSO)? Definition, How It…

by Yasar, K.

Lesson 6

Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Essential Resource Article

Information Security Management System: Emerging…

by Amarachi, A. A.
Essential Resource Other

Creating a Culture of Security

by The Coca Cola Company
Essential Resource Website

Improving security culture

by Government Security
Essential Resource Website

The Future of IT Governance: Striking a Balance…

by JOSYS
Essential Resource Website

Holistic IT Governance, Risk Management, Security…

by Lainhart, J. W.
Wider Reading Article

The 10 deadly sins of information security…

by von Solms, B. and von Solms, R.
Wider Reading Article

An Information Security Governance Framework

by Veiga, A. D. and Eloff, J. H. P.
Wider Reading Article

An integral framework for information systems…

by Trèek, D.

Lesson 7

Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Essential Resource Website

ISO 27001 Guide for Beginners

by Holloway, D.
Essential Resource Video

How to Write INFORMATION SECURITY POLICY | What…

by ISO Training Institute
Essential Resource Website

What is information security management system (…

by Kirvan, P.
Essential Resource Video

Learn about ISO/IEC 20000: Plan, Do, Check, Act (…

by GogoTraining - PeopleCert Accredited (ATO)
Essential Resource Website

Criminals sell counterfeit certificates to make…

by O'Neill, P. H.
Wider Reading Website

Download Free ISO 27001 & ISO 22301 Materials

by Advisera
Wider Reading Website

What is ISO 27001? A quick and easy explanation

by Kosutic, D.

Lesson 8

Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Essential Resource Other

Example risk assessment for an office-based…

by hseni
Essential Resource Article

Qualitative risk analysis: some problems and…

by Emblemsvåg, J. and Kjølstad, L. E.
Essential Resource Other

INTERNATIONAL STANDARD ISO/IEC FDIS 27001

by ISO/IEC
Wider Reading Article

Risk management for ISO27005 decision support

by Bahtit, H. and Regragui, B.
Wider Reading Article

Convergence of the latest standards addressing…

by Derock, A. et al.

Lesson 9

Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Essential Resource Article

Bring Your Own Device: An overview of risk…

by Ogie, R.
Essential Resource Video

The currency of the new economy is trust

by TED
Essential Resource Article

Eliminating the hypervisor attack surface for a…

by Szefer, J. et al.
Essential Resource Article

TaintDroid: An Information-Flow Tracking System…

by Enck, W. et al.
Wider Reading Article

A survey of cloud computing security overview of…

by Lemoudden, M. et al.
Wider Reading Website

It’s Me, and Here’s My Proof: Why Identity and…

by Riley, S.
Wider Reading Other

Privacy and security in cloud computing

by Friedman, A. A., and West, D. M.
Wider Reading Website

A Survey of Cloud Security Issues and Offerings

by Schultz, M. J.
Wider Reading Article

A quantitative analysis of current security…

by Gonzalez, N. et al.

Lesson 10

Key Text eBook

Information Security Management Principles

by Alexander, D. et al.
Key Text eBook

Management of Information Security

by Whitman, M. E. and Mattord, H. J.
Key Text eBook

Computer and Information Security Handbook

by Vacca, J. R., ed.
Essential Resource eBook

Cybersecurity of Digital Service Chains

by Kołodziej, J. et al. (eds)
Essential Resource Article

Building an Active Computer Security Ethics…

by Dittrich, D. et al.
Essential Resource Website

Data protection

by European Commission
Wider Reading Website

Privacy at the Crossroads: A Comparative Analysis…

by Grynwajc, S.
Wider Reading Website

Guide to the General Data Protection Regulation (…

by GRC Solutions

Footer

  • Library Portal
  • Academic Skills
  • English Language
  • Workshops
  • One-to-one Appointments

Footer 2

  • About Us
  • iLearn
  • News Hub
  • Help
  • Feedback To Win

Footer3

  • About Arden University
  • Accessibility Statement
  • Cookies Policy
  • Privacy Policy
Contact Us
address icon

Arden University,
Middlemarch Park,
Coventry, CV3 4FJ, UK

email icon
  • Library@arden.ac.uk
  • AcademicSkills@arden.ac.uk
  • EnglishLanguageHub@arden.ac.uk
Arden University Learning Success Hub 

© 2005-2026 Arden University  | All rights reserved